_LibMain@12
Static task
static1
Behavioral task
behavioral1
Sample
e0cae6ba886ffe976d12eed74e7f0619.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0cae6ba886ffe976d12eed74e7f0619.dll
Resource
win10v2004-20231215-en
General
-
Target
e0cae6ba886ffe976d12eed74e7f0619
-
Size
76KB
-
MD5
e0cae6ba886ffe976d12eed74e7f0619
-
SHA1
60fb96fe7d56858e3cf884141ff8d19f5566b0cc
-
SHA256
ce104ad0348c7f17fc38d330598660d633a3d2ab18c2f7fd3965c6e27018b52a
-
SHA512
41a5049ffb57b1bf8b630ad8578e73368a4d498903315055bfa337635532f5ef4591edc39656fd614624ae6b343c29c969f97e9249967c463458ecdfa6e635c5
-
SSDEEP
1536:gwoE6SVw0FL/nIamiACODtxt78wGROUg5Mw9w7vNyscf2K8Y0aKuy1E7CPb8UmjV:gw2Sa0FLfdmiACOjt78wGROUg5hq7NyX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0cae6ba886ffe976d12eed74e7f0619
Files
-
e0cae6ba886ffe976d12eed74e7f0619.dll windows:1 windows x86 arch:x86
1298ce61ffda214817a56e8d77d6da3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohs
recv
select
accept
send
sendto
setsockopt
socket
gethostbyaddr
gethostbyname
bind
closesocket
WSAGetLastError
WSAStartup
WSACleanup
__WSAFDIsSet
connect
getpeername
getsockname
WSASocketA
htonl
shell32
ShellExecuteA
kernel32
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentProcess
GetDateFormatA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
LoadLibraryA
CreateDirectoryA
MoveFileA
OpenProcess
PeekNamedPipe
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
SetFileTime
Sleep
TerminateProcess
TerminateThread
CreatePipe
CreateProcessA
WriteFile
WritePrivateProfileStringA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteFileA
DuplicateHandle
user32
GetWindowTextA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
ExitWindowsEx
CharUpperBuffA
CharToOemA
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
crtdll
_fdopen
_open_osfhandle
atoi
exit
fclose
fopen
fputc
fputs
fwrite
_cexit
malloc
mbstowcs
memcpy
memset
printf
raise
rand
setbuf
sprintf
srand
strcat
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
Exports
Exports
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
.edata Size: 76B - Virtual size: 76B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ